Account

Overview
HID Fund is an institutional investment vehicle structured to access asymmetric return potential while maintaining disciplined risk governance. The portfolio is organized around four key directions: Startups (Venture), Artificial Intelligence and Automation, Dual-Use and Defense Technologies, and Public and Digital Markets (Equities, Digital Assets, Exchange-Traded Funds). Allocation is governed by limits at the asset-class and single-position levels, rule-based entry and exit criteria, and periodic rebalancing.
Objective. Capture transformational value creation in early and growth stages where technology, product-market fit, and market structure enable outsized outcomes.
Scope. Enterprise software, applied AI, industrial technologies, security and resilience, critical infrastructure, and enabling platforms.
Selection framework.
Demonstrable technological differentiation and defensible intellectual property
Scalable unit economics and credible path to gross-margin expansion
Quality of founding team, governance readiness, and board composition
Round structure and terms, lead-investor quality, co-investment alignment
Market structure: customer concentration, procurement cycles, switching costs
Risk controls.
Position sizing by stage and liquidity profile
Milestone-based follow-on logic and downside scenario planning
Portfolio-level limits by sector, stage, and geography
Objective. Systematic exposure to infrastructure and applied layers where adoption curves and operating leverage are most durable.
Scope. Model and data infrastructure, inference and deployment stacks, MLOps and safety tooling, vertical automation (industrial, logistics, healthcare, finance).
Selection framework.
Mission-critical use cases tied to measurable productivity gains
Unit economics resilient to model-cost volatility and vendor dependency
Data advantages, regulatory posture, and security architecture
Enterprise adoption evidence: contracts, retention, integration depth
Risk controls.
Concentration limits across model, data, and application layers
Stress tests for regulatory shifts, input-cost spikes, and supply constraints
Periodic reassessment of moat durability and substitution risk
Objective. Allocate to technologies with validated demand across civilian and defense markets, supported by policy, procurement, and security priorities.
Scope. Sensing and ISR, autonomous systems, secure communications, advanced materials, energy resilience, manufacturing and supply-chain technologies.
Selection framework.
Clear end-user demand signals and pathway to program-of-record adoption
Compliance and export controls, certification timelines, supplier resilience
Industrial base readiness: manufacturability, testing, and lifecycle support
Revenue visibility via pilots, SBIR/BAA awards, or framework agreements
Risk controls.
Exposure caps by customer type and contract maturity
Scenario analysis for policy, budget, and regulatory changes
Counterparty and vendor-risk monitoring
Objective. Liquid, rules-based exposure to leading public-market instruments and digital assets within defined risk budgets.
Scope. Large-capitalization equities and ETFs with robust market infrastructure; leading digital-asset networks with institutional custody, market depth, and transparent on-chain metrics.
Selection framework.
Liquidity, free float, and index inclusion for equities and ETFs
For digital assets: network activity, security assumptions, validator economics, and on-chain transparency
Valuation discipline relative to growth, cash-flow durability, and market structure
Risk controls.
Allocation bands per instrument class; single-asset and correlation limits
Rules for entries/exits and periodic rebalancing
Drawdown controls and pre-defined review triggers
Architecture. Fixed-term tranches with defined duration and payout parameters, enabling clear cash-flow planning and exposure management.
Allocation discipline.
Top-down limits by asset class, sector, and theme
Bottom-up position sizing by liquidity, stage, and risk factor
Ongoing factor and correlation monitoring to prevent unintended concentrations
Process controls.
Documented investment memos; pre-trade checks; post-trade reviews
Periodic rebalancing; scenario analysis (macro, regulatory, technology)
Independent oversight of mandate adherence and concentration limits
Framework. Scenario-based risk governance aligned to institutional standards.
Market risk: volatility, drawdown and correlation budgets; stress testing
Operational risk: counterparty assessment, custody standards, and process controls
Regulatory risk: monitoring of policy changes, licensing, and compliance requirements
Liquidity risk: staging of entries and exits; tranche-level cash buffers
Monitoring and reporting. Regular performance attribution, risk factor decomposition, and variance explanations versus mandate.
Design. Each tranche specifies duration, parameters for payouts, eligible instruments, and risk limits.
Objectives. Match investor horizons to portfolio exposures; sequence capital deployment; enforce discipline on entries, exits, and rebalancing.
Evaluation. Tranche-level performance tracked against defined objectives with transparent methodology.
The four key directions—Startups (Venture), Artificial Intelligence and Automation, Dual-Use and Defense Technologies, and Public and Digital Markets (Equities, Digital Assets, Exchange-Traded Funds)—provide diversified access to asymmetric outcomes. The approach relies on institutional governance: fixed-term tranches, explicit allocation limits, rules-based execution, and scenario-driven risk management.
Meaningful successes are built step by step. Shape your financial future with a solid strategy from HID Fund.
A new password has been sent to the e-mail address you specified
Google Authenticator generates a new verification code every 30 seconds, providing secure authentication for logins, withdrawals, and security updates.
Download Google Authenticator from the App Store or Google Play.
Open Authenticator, scan QR code or enter the key, and back it up for recovery if needed
Enter the verification code sent to - to complete verification.
Google Authenticator generates a new verification code every 30 seconds, providing secure authentication for logins, withdrawals, and security updates.
Enter the verification code sent to - to complete verification.
Enter the verification code sent to - to complete verification.
Google Authenticator generates a new verification code every 30 seconds, providing secure authentication for logins, withdrawals, and security updates.
Enter the verification code from Google Authenticator app.
Only displays records of login history / security activity history from the past 30 days
Login History
|
Time
|
Location
|
IP Address
|
Browser
|
Device
|
|---|
Update your password to keep your account secure.
No crypto withdrawals or Fiat withdrawals will be permitted for 24 hours upon resetting your login password.
Update your password to keep your account secure.
No crypto withdrawals or Fiat withdrawals will be permitted for 24 hours upon resetting your login password.
Only displays records of login history / security activity history from the past 30 days
|
Last Login Time
|
Browser
|
Device
|
Location
|
IP Address
|
Action
|
|---|
Save a new withdrawal address securely.
...
Do you feel that the design of the order process helped you to complete your transaction?
|
Crypto
|
Network
|
Label
|
Address
|
Memo/Tag
|
|---|